Skip to content
View ParzivalHack's full-sized avatar
๐Ÿ’ญ
I may be slow to respond.
๐Ÿ’ญ
I may be slow to respond.

Block or report ParzivalHack

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
ParzivalHack/README.md

Welcome to My GitHub

  • ๐Ÿ›ก Security Professional with 4 years of experience & AI Red Teamer | Specialized in WebApp Pentesting, AI Security and Network Security Research, and Pentesting Tools & Exploits Development
  • ๐Ÿš€ Startup Founder & CTO | Leading security & development at Voyxa, an AI-powered B2B SaaS Voice AI Company, providing Helpdesk and Technical Support solutions to enterprises
  • ๐Ÿ”ฌ Cybersecurity Researcher | Investigating Prompt Injection Attacks, AI Exploit Development, Network Security, and Advanced Threat Analysis
  • ๐Ÿ’ก Tech Mentor & Educator | Active mentor at SecurityCert, Italyโ€™s largest cybersecurity community for professionals and companies
  • ๐ŸŽฏ Open-Source Contributor | Developing and maintaining Pentesting Tools, AI Security Solutions, and Automation in System Engineering
  • ๐Ÿ‘พ Continuous Learner | Advancing skills in LLM Security, Advanced Exploit Development, PowerShell Pentesting, and Network Security

๐Ÿ” About Me

Hey there! I'm Tommaso Bona, a Security Professional, Ethical Hacker, and AI Red Teamer from Italy. My expertise lies in offensive security, AI adversarial and Network Security research, Exploits/Tools Development and Penetration Testing.

I am dedicated to securing AI systems, identifying vulnerabilities in web applications and networks, and developing advanced security tools. My contributions focus on:

  • AI Red Teaming & LLM Security Auditing โ€“ Developing automated LLM security assessments and adversarial AI testing methodologies
  • Exploit & Malware Development โ€“ Crafting custom exploits, keyloggers, and evasion techniques for security testing
  • Web & Network Pentesting โ€“ Conducting offensive security assessments on applications and infrastructure
  • Prompt Injection & AI Security Research โ€“ Analyzing LLM vulnerabilities and adversarial ML techniques
  • Mentoring & Cybersecurity Education โ€“ Supporting the SecurityCert community and contributing to cybersecurity training initiatives

At Voyxa, I lead the development and delivery of our AI-driven solution, ensuring the highest security and compliance standards while managing a team of engineers and researchers.


๐Ÿ”ง Technical Expertise

Languages & Scripting

Python Shell PowerShell Bash

Security & Offensive Tooling

๐Ÿ”น AI Red Teaming | Adversarial AI Security, LLM Prompt Injection, Model Extraction
๐Ÿ”น WebApp & Network Pentesting | Exploit Development, Vulnerability Assessments, Threat Simulation
๐Ÿ”น Scripting & Development | Custom Advanced Payloads and Pentesting tools Development for Windows/Linux
๐Ÿ”น Threat Hunting & Forensics | SIEM/XDR Monitoring, CVE Mitigation, Malware Analysis


โš™๏ธ Tools & Technologies

Offensive Security & Exploitation

  • Web & Network Pentesting | Tools like SQLmap, Metasploit, Nmap, Wireshark, Recon-ng (but mostly i develop my own tools)
  • Exploit Development & Reverse Engineering | Custom Windows/Linux Exploits, Payload Development, Shellcode Injection
  • Malware Analysis & Evasion Techniques | Keyloggers, Reverse Shells, Obfuscation & AV Evasion
  • AI Security & Adversarial Attacks | LLM Red Teaming, OpenAI API Exploitation, Model Extraction & Manipulation
  • Digital Forensics & Threat Hunting | SIEM/XDR (Darktrace, ESET), IOC Analysis (Redline, Mandiant IOCEditor)
  • OSINT & Dark Web Operations | Intelligence Gathering, Threat Actor Tracking, Anonymity Techniques

Cybersecurity Research & AI Security

  • LLM Security Auditing Tools | Custom AI Exploit Development
  • AI Offensive Automations | Secure AI API Testing in Python
  • Adversarial ML | Prompt Manipulation, AI Attack Simulations

Cloud & Infrastructure Security

  • AWS Security & IAM | Infrastructure Hardening
  • Active Directory & WatchGuard Firewall Configuration
  • Network Monitoring: ESET Protect, Checkmk, CoreMon Observium

Operating Systems

Windows Kali Linux Arch Linux Android


๐Ÿ† Relevant Certifications

  • ISC2 Certified in Cybersecurity (CC)
  • Fortinet Certified Associate in Cybersecurity โ€“ Fortinet
  • Blue Team Junior Analyst (BTJA) โ€“ Security Blue Team
  • Cybersecurity Roles, Processes and Operating System Security โ€“ IBM
  • ESET Managed Cloud Security Specialist
  • ESET Managed Client Security Specialist
  • D|FE, N|DE & E|HE โ€“ EC-Council
  • Practical Cyber Threat Intelligence โ€“ EC-Council
  • Authentication and Authorization with AWS Identity and Access Management โ€“ AWS

๐Ÿ”— Connect with Me

LinkedIn Badge
Gmail Badge


๐Ÿ“Š GitHub Stats

Click here for GitHub Stats

GitHub Stats
Top Language

Pinned Loading

  1. Poison-MASSReporter Poison-MASSReporter Public

    This script is a PyQt5-based application that performs a Mass Reporting Attack on any TikTok profile, resulting in a ban for most of them.

    Python 66 9

  2. T-DoS T-DoS Public

    Denial of Service tool by ParzivalHack

    Python 28 6

  3. BruteCam BruteCam Public archive

    Tool with a huge database of hacked CTV Cameras, sorted by country.

    Python 28 2

  4. T-XSS T-XSS Public

    XSS vulnerability scanner written in Python

    Python 15 2

  5. Proxy-Inspector Proxy-Inspector Public

    Proxy Inspector is a Python tool that can be used to check the validity and anonymity of any existining proxy

    Python 6 1

  6. Octo-Miner Octo-Miner Public archive

    ETH Miner made in Python with the infura.io web3 infrastructure

    Python 8 1